0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


How to Migrate G Suite (Google Apps) to Office 365? In this post, we will describe two methods to perform cloud to cloud migration from Google G Suite to Microsoft Office 365 domain. This includes a complete guide to migrate emails, contacts, calendars, and documents from one domain to another without losing any information. Microsoft provides users with a ...


Entering into the year 2020, the ‘main thing’ while navigating the technology world is ‘Cyber Security.’ Innovations exploding in different areas of life and industries are giving rise to various challenges, among which cybersecurity is at the top of the list. With the advent of technological advancements such as Artificial Intelligence, 5G, quantum computing, IoT (Internet of Things), autonomous vehicles, ...


Data privacy and security is now paramount for organizations to ensure they’re meeting both legislative standards and compliance requirements. This is especially critical for any business that handles protected health information (PHI) either directly or in partnership with another enterprise — data storage, handling, and eventual destruction are all governed by the Health Insurance Portability and Accountability Act (HIPAA).While many ...


Biometrics are becoming a cutting edge technology in the field of information security and data privacy. Biometrics entertain identification against unique human features. Biometrics being an emerging technology comes up with convenience identity recognition by replacing traditional passwords authentication with advanced identification systems. Begin FREE Intro to IT and Cybersecurity Course >> ...


This blog was originally posted on Cisco Security Blog by author Ben Nahorney. Reposted with permission. Online advertising is an integral part of today’s internet experience. In many ways, ads are the lifeblood behind many websites, providing the necessary funding to keep sites running, as well as supporting the creation of new content. While it ...


For too long, cybercriminals have been raking in billions of dollars from businesses around the globe through the use of crypto-ransomware. This is a specific type of ransomware that uses encryption technology to ‘scramble’ the data of its victims. The victim is then instructed to pay a ransom, by a specific deadline, to have their data decrypted. The threat is ...


This blog is by Knogin blog by author Anthony Carballo. Reposted with permission. It was found in Android OS versions 8.0 & higher that the security warning message to install external apps does not prompt users when an app is transferred via NFC (Near Field Communication). This can give nefarious actor leverage to send and ...

This blog is by authors: Ryan Corey, Co-Founder and Ralph Sita, Co-Founder, Cybrary The ever-expanding cyber threat landscape and never-ending shortage of cybersecurity skills make for a perfect storm across all industries. What has helped to counter this perfect storm is the subscription economy, where IT and security professionals can take online vocational training on a continual, ...


The diversity and sophistication of cyberattacks keep growing, posing threats for businesses of all shapes and sizes. Given that, it’s not surprising at all that the global cybersecurity market is expected to reach 300 billion by 2024 1 . To avoid becoming victims of online threats, businesses need to invest in a solid cybersecurity strategy. This leads to two major ...


Azure offers remote access to enterprise-grade Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Database as a Service (DBaaS), and Software as a Service (SaaS). Azure’s data centers are spread across 54 regions, and its infrastructure is hybrid-ready, backed by over 90 compliance certifications, and provides a built-in backup 1 module. This article provides a review ...